Backdoor

Backdoor.MSIL.Mokes.ca removal instruction

Malware Removal

The Backdoor.MSIL.Mokes.ca is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Backdoor.MSIL.Mokes.ca virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Guard pages use detected – possible anti-debugging.
  • Dynamic (imported) function loading detected
  • Performs HTTP requests potentially not found in PCAP.
  • Starts servers listening on 127.0.0.1:0
  • Reads data out of its own binary image
  • CAPE extracted potentially suspicious content
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • A scripting utility was executed
  • Uses Windows utilities for basic functionality
  • Uses Windows utilities for basic functionality
  • Detects Sandboxie through the presence of a library
  • Detects Avast Antivirus through the presence of a library
  • Checks for the presence of known windows from debuggers and forensic tools
  • Created a process from a suspicious location
  • Steals private information from local Internet browsers
  • Behavior consistent with a dropper attempting to download the next stage.
  • Network activity contains more than one unique useragent.
  • CAPE detected the Vidar malware family
  • Checks the presence of disk drives in the registry, possibly for anti-virtualization
  • Attempts to modify proxy settings
  • Attempts to modify Windows Defender using PowerShell
  • Harvests cookies for information gathering
  • Attempts to execute suspicious powershell command arguments

How to determine Backdoor.MSIL.Mokes.ca?


File Info:

name: 5D2928216DFBF5EF4F0B.mlw
path: /opt/CAPEv2/storage/binaries/cd2cd47c9dafcf93c265a57ebe323bd0486dc2a6dfd3ce76cddde440aaced5e1
crc32: 92571F71
md5: 5d2928216dfbf5ef4f0b8bab85694518
sha1: e8d48cb49d44d1bfcfb8e00923e9ff3db0321db2
sha256: cd2cd47c9dafcf93c265a57ebe323bd0486dc2a6dfd3ce76cddde440aaced5e1
sha512: 773b1cb36d9651f8905cf3f0b07d12806e277ac93ab44a0c04bc6431be5fa8cbf707e649a261489170ed42709577c4ae024f4121f9177cc7e39d010daa38753b
ssdeep: 98304:x0CvLUBsgfHviBXHn1mBd78X+Ddbiyv5aCctZr9NVl7m:xpLUCg/viBXHn1mDe+Jb5vwr9J7m
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T16AF533153ACBC0B5E6C61535ED444FB2A6BED3DC1E338CD36BA9989E4E3C471091AE09
sha3_384: db9662a4884203d7d8b482e7226786639af559ed9fffcedee4a39ad71f3d6105489f42338381697ada69368d7cfa2e3b
ep_bytes: 558bec6aff6898c24100680691410064
timestamp: 2019-02-21 16:00:00

Version Info:

CompanyName: Igor Pavlov
FileDescription: 7z Setup SFX
FileVersion: 19.00
InternalName: 7zS.sfx
LegalCopyright: Copyright (c) 1999-2018 Igor Pavlov
OriginalFilename: 7zS.sfx.exe
ProductName: 7-Zip
ProductVersion: 19.00
Translation: 0x0409 0x04b0

Backdoor.MSIL.Mokes.ca also known as:

Elasticmalicious (high confidence)
MicroWorld-eScanGen:Variant.Jaik.45703
FireEyeGen:Variant.Jaik.45703
CAT-QuickHealTrojan.SabsikIH.S21959152
McAfeeArtemis!5D2928216DFB
CylanceUnsafe
K7AntiVirusTrojan ( 0058270d1 )
K7GWTrojan ( 0058270d1 )
ArcabitTrojan.Jaik.DB287
BitDefenderThetaGen:NN.ZedlaF.34084.n88baOE@FOp
CyrenW32/ArkeiStealer.A.gen!Eldorado
SymantecML.Attribute.HighConfidence
ESET-NOD32multiple detections
APEXMalicious
ClamAVWin.Packed.Barys-9859531-0
KasperskyBackdoor.MSIL.Mokes.ca
BitDefenderGen:Variant.Jaik.45703
AvastWin32:DropperX-gen [Drp]
Ad-AwareGen:Variant.Jaik.45703
SophosMal/Generic-S
DrWebTrojan.Inject4.16523
TrendMicroTrojanSpy.MSIL.RELINE.USASHIL21
McAfee-GW-EditionBehavesLike.Win32.Generic.wc
EmsisoftGen:Variant.Jaik.45703 (B)
JiangminTrojanDownloader.Generic.bjkd
AviraHEUR/AGEN.1145173
MAXmalware (ai score=80)
Antiy-AVLTrojan/Generic.ASMalwS.349C609
KingsoftWin32.Troj.Undef.(kcloud)
MicrosoftTrojan:Win32/Tnega!MSR
GDataGen:Variant.Jaik.45703
CynetMalicious (score: 100)
VBA32Trojan.Zapchast
ALYacGen:Variant.Jaik.45703
MalwarebytesTrojan.Dropper.SFX.Generic
TrendMicro-HouseCallTrojanSpy.MSIL.RELINE.USASHIL21
RisingTrojan.Kryptik!1.D975 (CLASSIC)
eGambitUnsafe.AI_Score_99%
FortinetW32/BSE.4Q7Q!tr
AVGWin32:DropperX-gen [Drp]
Cybereasonmalicious.16dfbf

How to remove Backdoor.MSIL.Mokes.ca?

Backdoor.MSIL.Mokes.ca removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment